Try our new research platform with insights from 80,000+ expert users

GTB Technologies Inspector vs Netwrix Endpoint Protector comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 3, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cloudflare
Sponsored
Average Rating
8.6
Reviews Sentiment
7.2
Number of Reviews
75
Ranking in other categories
CDN (1st), Distributed Denial-of-Service (DDoS) Protection (1st), Managed DNS (1st), Cloud Security Posture Management (CSPM) (13th)
GTB Technologies Inspector
Average Rating
8.2
Reviews Sentiment
7.1
Number of Reviews
8
Ranking in other categories
Data Loss Prevention (DLP) (20th)
Netwrix Endpoint Protector
Average Rating
8.4
Reviews Sentiment
7.0
Number of Reviews
27
Ranking in other categories
Data Loss Prevention (DLP) (8th)
 

Featured Reviews

Spencer Malmad - PeerSpot reviewer
It's easy to set up because you point the DNS to it, and it's working in under 15 minutes
Cloudflare is highly scalable. Cloudflare is a system with a web portal that the end users like me see. It's a console where we can adjust the DNS, caching, and security features all in that console. Cloudflare owns thousands of servers across the world that cache the data. It's a powerful solution. When clients sign up for Cloudflare, they're getting this monster content delivery network, security, and a web application firewall in one. It's all rolled into one, and it's massive. Unless you have your website hosted on a massive hosting provider, there's no way that you can deliver the amount of data that Cloudflare can provide to the end users. If you have static content, there's no way that you can ever match what Cloudflare can do. Obviously, there are competitors to Cloudflare that do the same, but I'm saying other types of solutions. Let's say you go with F5. Great, that's on-prem. That's in your colo. You can't deliver as much data to the internet as you can with a CDN. You don't have to spend $20,000 on a net scaler, F5, or whatever Cisco's selling now. You don't have to buy that. You pay them $50 a month or $150 a month. It's totally worth it because even in five years, you'll never get the performance value, not just the actual ROI. You have to consider how much throughput you can get with Cloudflare.
Marcelo Grandchamp - PeerSpot reviewer
Enables organizations to monitor the network and protect themselves from data leakage
The initial setup process is very simple and easy. We have no issues to do it for ourselves or our customers. The deployment takes less than 20 days. The integration is very simple. However, first, we must understand what we want to have on our network and what we want to prevent. If we don't have this information before we start the configuration, we will be lost. We must know what kind of protection we need in our company. We have LGPD in Brazil. It is similar to GDPR in Europe. It prevents any personal information from being linked to other companies without permission. We have to take care of the personal information of our customers, employees, and partners. To deploy the tool, we must understand what we need to do. We must download the whole package and have our infrastructure ready to receive it. We must get the SSL certification and start to configure our platform. When the process is finished, we must roll out a small portion of our network to ensure everything will be well. After that, we must do the full rollout.
Mohammad Amir Hossain - PeerSpot reviewer
Block USBs and manage ports effectively across multiple OS platforms
There is an important feature that needs to be added. In Linux, it is difficult to control uninstallation. Users can uninstall it at any time, and we can only monitor that it is uninstalled. If there is a feature that can notify in the master dashboard that an agent has been uninstalled, it would be very beneficial.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The solution is stable, and the DNS servers are simple to use."
"The solution automatically detects and responds to certain types of traffic based on geolocation."
"The most valuable feature of Cloudflare is that it has a free version. They give us the free version with the anti-DDoS features and also the load balancing solution."
"The simplicity of the overall dashboard makes it a great product for a user like me who has less understanding of the internet than a developer or other more technical people. It gives me peace of mind. I also love the easy customization of the Page Rules."
"Cloudflare offers CDN and DDoS protection. We have the front end, API, and database in how you structure applications."
"Easier http to https redirect using page rules"
"The DDoS protection is the most valuable aspect of the solution."
"The solution is very good at mitigating threats."
"This solution helps classify what is confidential and what is not, allowing products to be installed at home if they do not contain confidential information."
"They have a fingerprint feature that is very awesome. OCR is very awesome to have too."
"The classifications in place are very helpful in making policies for ensuring sensitive data can be contained."
"The main thing that I like about GTB is that it has a single agent for DLP and data classification. You can use the same agent. In terms of licensing too, it has a single license. When it comes to data classification, it supports open-source document platforms such as ChainSoft and OpenOffice."
"I am impressed with the tool's ease of deployment."
"The most valuable feature is we can develop what we want. If we have an old or new requirement, they are able to support us to develop it all within one month."
"The monitoring features are valuable."
"The product has a centralized console for everything."
"The most valuable feature is device control."
"The most valuable aspects of the solution is the device control, which manages any portable device connected to the endpoint, and content-aware protection, which controls data in motion from the endpoint to outside, like when users try to upload data to a web browser or an instant messaging application."
"The versatility regarding the exit point Endpoint Protector supports in making sure that important data doesn't leave our organization is vital for us. In the industry that we're in, data breaches are a significant concern. While our staff is contractually required to maintain confidentiality and they're all very aware that they shouldn't try and transfer company data of different classifications elsewhere to non-company devices, there's a risk."
"One unique feature is drive encryption. We have portable devices, and they have a password vault. If you transfer any data to your device, you can use the password vault to protect it."
"I like the data protection feature. Our users were working on a client's CRM application with a lot of client-related EIA information. We did not want the users to be able to send any of this data outside. I also like its ability to protect against data leaks via emails and social media. I like that you can deploy it quickly, and it requires no training."
"Compared to a lot of the USB management systems out there, Endpoint Protector is the only one that comes with true USB management and the DLP side of it. I'm pretty impressed because I've used several solutions with DLP and USB management, and I've never seen granularity like this solution has."
"There are effectively two areas of DLP to look at from a technical perspective. One is how it performs the pickup of information traversing the system and the other is how the policy engine, which analyzes the data, works. On the first aspect, CoSoSys is probably best of breed for macOS because they're reasonably well-integrated into the operating system. They're looking at the file system operations level, not at the execution level."
"There are a lot of features, but the main feature is that I can use a device serial number to unlock any particular machine or for all machines. If I have a phone, like a Samsung phone, I can whitelist that specific phone for full access wherever it is plugged into any of our devices. This is the same with a USB, because most USBs come in bulk and have the same serial number. I can then whitelist that particular USB to be read-write with full access."
 

Cons

"It would be good if Cloudflare could have more servers for better traffic routing or an increase in the traffic routed. This is what I'd like to improve in Cloudflare."
"It would be helpful if the solution could continue evolving to compete with the other solutions on the market."
"Cloudflare should add more documentation and pricing to the cloud version."
"The reporting can definitely be improved to offer a lot more explanation on something that may have happened or has actually happened."
"We have noticed multiple instances where Cloudflare falsely indicates that our servers are down, even when there is no actual load on them. This makes it challenging for us to identify the exact issue."
"Latencies are always a problem."
"It should have easier documentation for the configuration. It's very technical and people who aren't technical should also be able to do the configuration."
"The documentation could improve for Cloudflare DNS."
"The performance could be better."
"They have a roadmap for the Linux platform and Mac as well, and in the next quarter, they might have patch management also for Windows. However, they don't have that much for Linux and Mac. So, we need those things in Linux and Mac as well."
"The product needs to improve its support so that users can just log in and create tickets as opposed to sending emails. Sending emails is difficult to track. It also needs to work on its analytics platform."
"The tool should include better AI features."
"The solution’s performance must be improved."
"To stay competitive, they should expand to smartphones."
"It would be great if they have information rights management (IRM) on the same agent."
"The solution could improve by providing additional availability requirements."
"When you want to uninstall and reinstall, there are a lot of issues. You have to do a lot of workarounds to reinstall Endpoint Protector. This is a major issue that we have constantly because we still have old systems with XP. While there are only very few, we need to run them because there are machines attached that only run on XP. When we need to uninstall and reinstall on XP or Windows 10, we have serious issues left in the Registry Editor everywhere. There is a lot of manual interference to get the reinstallation to work. For the uninstallation of Endpoint Protector, they need to work on this so it doesn't leave any leftovers behind."
"It would be helpful to implement filtering mechanisms so that we can sort and view the data based on software and vendor, providing more clarity and ease in analysis."
"Sometimes, it should try to focus on one thing rather than multiple things. Endpoint Protector does device control very well, which is why we use that particular function."
"In Linux a user can remove a getent anytime. There is no control there on the file structure in Linux. So if this solution could give us information on what users removed in the dashboard, it would help us."
"The policy engine could use a bit of work. They're definitely going in the right direction. We've been working with them over the last few weeks to try and optimize that. But it's reasonably clear that they're just not putting as much effort into the policy engine as into other things, like content discovery."
"It would be better if they had an inbound restriction feature. For example, I work out of my home from my personal computer. All my policies can be deployed while working. When I am done, I should be able to use my machine as my personal machine, and all these policies should be waived. In the next release, I want time bound restriction of the policies because most of these users were working out of home and using their personal computers."
"Currently, for additional applications that need monitoring by the EPP, a request must be made to their technical support. It would be beneficial to add a feature allowing users to manually add applications for monitoring without depending on the vendor."
"Endpoint Protector would be improved with more DLP templates."
 

Pricing and Cost Advice

"The price is reasonable."
"We are using the free version."
"The tool is a premium product, so it is very expensive."
"I think the pricing is competitive. I think as far as licensing is concerned it's pretty straightforward because it's based on domain. It's just that sometimes domains could be tricky with some customers."
"For Cloudflare, I recommend it heavily for small businesses with revenue under a couple of million dollars. Onboarding is easy, and they even have a free plan. This makes it simple for businesses in the $100,000-$500,000 range to try it out and see its value, allowing them to scale up their infrastructure as needed."
"When you compare Cloudflare DNS to other solutions, such as Akamai, the price is reasonable."
"The solution has many features but there are ones that you need to pay for. Sometimes you have to find out which is available for free and which you have to pay for."
"The cost primarily depends on the size of the organization."
"The tool has a fair price."
"When comparing GTB Technologies Inspector to other solutions you receive a good value for your money when considering all the features and benefits."
"They offer a lot of features in a single bundle. So, if you want to remove some features from GTB, you can remove those. You don't need to buy those, and the price will reduce accordingly. I am very happy with the pricing."
"The tool's pricing is affordable and based on the number of endpoints."
"The tool is not expensive."
"Its price is very reasonable and competitive."
"The price of Endpoint Protector by CoSoSys is more or less the same as other competing solutions."
"The product has average pricing."
"From what we've seen, their pricing is a lot lower than the other stuff we've looked at. I actually don't have any concerns with their pricing. They were probably the most reasonable company out there for the features that were offered. It was pretty straightforward in terms of licensing, and you just pay for the license."
"The pricing depends on the customers."
"[The pricing] is reasonable compared to what's out there."
"I don't have any issue with the licensing and pricing. I would love for it to be cheaper, but at the same time I'm getting a lot from it."
"The pricing is very competitive and is cheaper in comparison to that of other solutions. It makes it an easy decision to go with EPP for the data loss prevention infrastructure."
"We found the pricing pretty attractive. However, volume-based pricing wasn't available."
report
Use our free recommendation engine to learn which Data Loss Prevention (DLP) solutions are best for your needs.
850,671 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
16%
Computer Software Company
14%
Comms Service Provider
9%
Financial Services Firm
8%
Financial Services Firm
13%
Computer Software Company
13%
Comms Service Provider
10%
Manufacturing Company
9%
Computer Software Company
17%
Financial Services Firm
11%
Manufacturing Company
11%
University
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

Which is the best DDoS protection solution for a big ISP for monitoring and mitigating?
Cloudflare. We are moving from Akamai prolexic to Cloudflare. Cloudflare anycast network outperforms Akamai static GR...
Which would you choose - Cloudflare DNS or Quad9?
Cloudflare DNS is a very fast, very reliable public DNS resolver. It is an enterprise-grade authoritative DNS service...
What do you like most about Cloudflare?
Cloudflare offers CDN and DDoS protection. We have the front end, API, and database in how you structure applications.
What do you like most about GTB Technologies Inspector?
The product has a centralized console for everything.
What needs improvement with GTB Technologies Inspector?
The tool should include better AI features. It must enable us to make some predictions based on the behavior of my ne...
What is your primary use case for GTB Technologies Inspector?
We use Microsoft 365. We use GTB Technologies Inspector as a CASB solution to protect us from any data leakage in Mic...
What do you like most about Endpoint Protector?
Its robust security audit and compliance functionalities prove especially beneficial for businesses in sectors like B...
What is your experience regarding pricing and costs for Endpoint Protector?
When we started, the price was reasonable, but it has been increasing over time. I rate the price as four, indicating...
What needs improvement with Endpoint Protector?
There is an important feature that needs to be added. In Linux, it is difficult to control uninstallation. Users can ...
 

Also Known As

Cloudflare DNS
Inspector, GTB Technologies DLP
CoSoSys Endpoint Protector
 

Overview

 

Sample Customers

Trusted by over 9,000,000 Internet Applications and APIs, including Nasdaq, Zendesk, Crunchbase, Steve Madden, OkCupid, Cisco, Quizlet, Discord and more.
Supya Security Software
Samsung, Toyota, Philips, Zeppelin, Western Union, eBay
Find out what your peers are saying about GTB Technologies Inspector vs. Netwrix Endpoint Protector and other solutions. Updated: April 2025.
850,671 professionals have used our research since 2012.